Method and system for predicting victim users and detecting fake user accounts in online social networks

a fake user and online social network technology, applied in the field of telecommunications, can solve the problems of low detection performance, inability to provide provable security guarantees, and inability to meet the needs of real-world deployment,

Inactive Publication Date: 2015-07-02
TELEFONICA DIGITAL ESPANA
View PDF8 Cites 126 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0080]The present invention enables proactive mitigation of attacks originating from fake accounts in OSNs by predicting potential victims who are likely to share relationships with fake accounts. This means OSNs can now help potential victims avoid falling prey to automated social engineering attacks, where the attacker tricks users into accepting his connection requests, by applying one of the known proactive user-specific abuse mitigation techniques, e.g., the aforementioned Facebook Immune System (FIS). For example, potential victims can reject connecting with possibly fake user accounts if they are better informed through privacy “nudges”, which represent warnings that communicate the implications of a security or privacy-related decision (e.g., by informing users that connecting with strangers means they can see their pictures). By displaying these warnings to only potential victims, the OSN avoids annoying all other users, which is an important property as user-facing tools tend to introduce undesired friction and usability inconvenience.
[0081]The present invention enables retroactive graph-based detection that is effective in the real world, which is achieved by incorporating victim predictions into the calculation of user ranks. This means that OSNs can now deploy effective graph-based detection that can withstand a larger number of fake relationships and accounts, and still deliver higher detection performance with desirable, provable security guarantees.
[0082]The present invention employs efficient methods to predict potential victims and detect fake accounts in OSNs, which in total take 0(n·log n+m) time, where n is the number of nodes and m is the number of edges in the social graph. This makes the present invention suitable for large OSNs consisting of hundreds of millions of users.

Problems solved by technology

Feature-based detection technique is efficient but does not provide any provable security guarantees.
This way, nodes with rank values close to zero are considered suspicious and represent isolated, fake accounts.
As a result, graph-based detection generally suffers from bad ranking quality, and therefore, low detection performance, rendering it impractical for real-world deployments, including for example multi-community scenarios.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for predicting victim users and detecting fake user accounts in online social networks
  • Method and system for predicting victim users and detecting fake user accounts in online social networks
  • Method and system for predicting victim users and detecting fake user accounts in online social networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090]The matters defined in this detailed description are provided to assist in a comprehensive understanding of the invention. Accordingly, those of ordinary skill in the art will recognize that variation changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, description of well-known functions and elements are omitted for clarity and conciseness.

[0091]The embodiments of the invention can be implemented in a variety of architectural platforms, operating and server systems, devices, systems, or applications. Any particular architectural layout or implementation presented herein is provided for purposes of illustration and comprehension only and is not intended to limit aspects of the invention.

[0092]It is within this context, that various embodiments of the invention are now presented with reference to the FIGS. 1-5.

[0093]FIG. 1 presents a social graph G comprising a non-Sybil region GH formed by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for predicting victims and detecting fake accounts in OSNs, comprising: a feature-based classifier for predicting victims by classifying, with a classification probability, a target variable of each user in the OSN social graph; a graph-transformer for transforming the social graph into a defense graph by reassigning edge weights to incorporate victim predictions using the classification probability, a graph-based detector for detecting fake users by computing through the power iteration method a probability of a random walk to land on each node in the defense graph after 0(log n) steps, assigning to each node a rank value equal to a node's landing probability normalized by the node degree, sorting the nodes by their rank value and estimating a detection threshold such that each node whose rank value is smaller than the detection threshold is flagged as representing a fake account.

Description

FIELD OF THE INVENTION[0001]The present invention has its application within the telecommunication sector, and especially, relates to Online Social Networking (OSN) services, such as Facebook, Twitter, Digg, LinkedIn, Google+, Tuenti, etc., and their security mechanisms against attacks originating from automated fake user accounts (i.e., Sybil attacks).BACKGROUND OF THE INVENTION[0002]Traditionally, the Sybil attack in computer security represents the situation wherein a reputation system is subverted by forging identities in peer-to-peer networks through creating a large number of pseudonymous identities and then using them to gain a disproportionately large influence. In an electronic network environment, particularly in Online Social Networks (OSNs), Sybil attacks are commonplace due to the open nature of these networks, where an attacker creates multiple fake, each called a Sybil node, and pretends to be multiple real users in the OSN.[0003]Attackers can create fake accounts in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L67/306
Inventor BOSHMAF, YAZANLOGOTHETIS, DIONYSIOSSIGANOS, GEORGIOS
Owner TELEFONICA DIGITAL ESPANA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products